The UML class diagram visualizes a threat model with 13 threats, determined from the conducted systematic literature review, which target the input data for the initial compromise. The compromise of the training data is conducted either through “ML system input/API”, “Processing hardware running the ML model” system assets or by targeting the “Machine learning model” itself.
Input data: real-time user-supplied, external textual data, which is ingested by the system and passed to the model for inference and analysis. For the LLM’s the input data primarily consists of textual queries, which are submitted to the model to produce a target response. Although, with development of multimodal models, the text may incorporate additional mediums of data, such as images.